Advantages of nonblocking collective communication in MPI have been established over the past quarter century, even predating MPI-1. For regular computations with fixed communication patterns, more optimizations can b...
详细信息
software testing is the most important task in software production and it takes a lot of time, cost and effort. Thus, we need to reduce these resources. software Defect Prediction (SDP) mechanisms are used to enhance ...
详细信息
ISBN:
(纸本)9781538605288
software testing is the most important task in software production and it takes a lot of time, cost and effort. Thus, we need to reduce these resources. software Defect Prediction (SDP) mechanisms are used to enhance the work of SQA process through the prediction of defective modules, many approaches have been conducted by researchers in order to predict the fault-proneness modules. This paper proposed an approach for the SDP purpose, it employs two existed algorithms to have a high performance, that are the Bat-based search Algorithm (BA) for the feature selection process, and the Random Forest algorithm (RF) for the prediction purpose. This paper also has tested a number of feature selection algorithms and classifiers to see their effectiveness in this problem.
In this paper, we address a novel problem of cloning a patch of the source spherical panoramic image to the target spherical panoramic image, which we call 360◦ panorama cloning. Considering the sphere geometry constr...
详细信息
In this paper, we propose a discriminative keypoint selection-based 3D face recognition method that is superior to prevalent techniques in terms of both computational complexity and performance. We use the average fac...
详细信息
In this paper, we propose a discriminative keypoint selection-based 3D face recognition method that is superior to prevalent techniques in terms of both computational complexity and performance. We use the average face model (AFM) for face registration to efficiently locate the axis of symmetry in the rotated face mesh and recover a full frontal face from a 3D face model commonly corrupted due to pose variances. Instead of using the keypoint detection method, we use the feature selection algorithm to find the most discriminant keypoints for face identification and reduce computational time for not only feature extraction but also keypoint matching. The results of the experiments conducted on the Bosphorus database and the UMBDB show that our algorithm can improve rank-1 identification accuracy, thus confirming its robustness against pose variances, expressions, and occlusions.
Mobile phone log data (e.g., phone call log) is not static as it is progressively added to day-by-day according to individual's diverse behaviors with mobile phones. Since human behavior changes over time, the mos...
详细信息
The basis for this project was to attempt to improve upon searches for neighboring zipcodes. Simple search algorithms lack the granularity to properly determine nearby zipcodes. In this paper, we include data concerni...
详细信息
*** becomes increasingly popular in building server-side JavaScript applications. It adopts an event-driven model, which supports asynchronous I/O and non-deterministic event processing. This asynchrony and non-determ...
详细信息
ISBN:
(纸本)9781538626849
*** becomes increasingly popular in building server-side JavaScript applications. It adopts an event-driven model, which supports asynchronous I/O and non-deterministic event processing. This asynchrony and non-determinism can introduce intricate concurrency bugs, and leads to unpredictable behaviors. An in-depth understanding of real world concurrency bugs in *** applications will significantly promote effective techniques in bug detection, testing and fixing for ***. In this paper, we present NodeCB, a comprehensive study on real world concurrency bugs in *** applications. Specifically, we have carefully studied 57 real bug cases from open-source *** applications, and have analyzed their bug characteristics, e.g., bug patterns and root causes, bug impacts, bug manifestation, and fix strategies. Through this study, we obtain several interesting findings, which may open up many new research directions in combating concurrency bugs in ***. For example, one finding is that two thirds of the bugs are caused by atomicity violation. However, due to lack of locks and transaction mechanism, *** cannot easily express and guarantee the atomic intention.
The ubiquitous wireless communication medium poses serious threats to the confidentiality and integrity of communication in constrained networks like Internet-of-Things (IoT), sensor nodes or ad-hoc groups of soldiers...
详细信息
The ubiquitous wireless communication medium poses serious threats to the confidentiality and integrity of communication in constrained networks like Internet-of-Things (IoT), sensor nodes or ad-hoc groups of soldiers on a battlefield. Data encryption is essential for ensuring the confidentiality and integrity of the wireless network communication. We focus on the problem of group key distribution in dynamically formed groups of network nodes. One major challenge is that the neighborhood of a node is not known prior to deployment and therefore, the group key establishment protocol needs to be independent of the physical network topology. In this paper, we describe an efficient template based approach for group key establishment using only shared symmetric secrets. Our template is a logical shared secret distribution built on the network nodes prior to deployment, which ensures that any node shares a distinct set of secrets with any dynamic group of nodes and thus, is able to establish a secure group key. We illustrate our template using two secret distribution protocols: sub-set and dual one-way hash chain distributions. Compared to existing algorithms, our template approach gives flexibility to the network administrator to choose from different secret distribution protocols for fine-grained control over the security levels and performance.
The so-called Yao's millionaire problem (YMP) is about securely comparing two numbers held by two parties, respectively. After comparison, the actual values of these two numbers are still unknown to both parties. ...
详细信息
This paper aims at developing an operative and reliable internal Planar Inverted F Antenna (PIFA) for mobile phone utilization with designed frequency bands at GSM900, GSM1800/1900, UMTS2100 and LTE2300/2500. Addition...
详细信息
This paper aims at developing an operative and reliable internal Planar Inverted F Antenna (PIFA) for mobile phone utilization with designed frequency bands at GSM900, GSM1800/1900, UMTS2100 and LTE2300/2500. Additionally, a feasible PIFA with operating band locates at GPS L4 band (1.8414GHz) is also investigated for GPS satellite framing signal receiving and transmission in a mobile phone. The property disparities between reference and designed antenna are explored and discussed.
暂无评论